Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] Windows Botnets Make More DDOS Attacks and Extortion Than Before, Google Hurt by it

  • Subject: [News] [Rival] Windows Botnets Make More DDOS Attacks and Extortion Than Before, Google Hurt by it
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Fri, 15 Jan 2010 15:08:10 +0000
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

DDoS Attacks Are Back (and Bigger Than Before)

,----[ Quote ]
| Distributed denial-of-service (DDoS) 
| attacks are certainly nothing new. 
| Companies have suffered the scourge since 
| the beginning of the digital age. But DDoS 
| seems to be finding its way back into 
| headlines in the past six months, in thanks 
| to some high-profile targets and, experts 
| say, two important changes in the nature of 
| the attacks.
| 
| The targets are basically the same -- 
| private companies and government websites. 
| The motive is typically something like 
| extortion or to disrupt the operations of a 
| competing company or an unpopular 
| government. But the ferocity and depth of 
| the attacks have snowballed, thanks in 
| large part to the proliferation of botnets 
| and a shift from targeting ISP connections 
| to aiming legitimate-looking requests at 
| servers themselves. 
`----

http://www.pcworld.com/article/186903/ddos_attacks.html?tk=rss_news

Microsoft Warns of IE Zero-day Used in Google Attack

http://www.pcworld.com/article/186957/iezeroday.html?tk=rss_news

IE Exploit Used to Launch Chinese Attacks on Google

,----[ Quote ]
| Early speculation focused on the Abobe 
| Reader zero-day exploit as the source of 
| the Chinese attacks on Google and other 
| corporations earlier this week, but Adobe 
| may be off the hook--or at least share the 
| blame. Microsoft has determined that an 
| unknown flaw in Internet Explorer was one 
| of the holes used to launch the attacks 
| which have led to Google threatening to 
| shut down its Chinese operations.
`----

http://www.pcworld.com/businesscenter/blogs/bizfeed/186970/ie_exploit_used_to_launch_chinese_attacks_on_google.html?tk=rss_news

If Google Leaves China, What Happens to YouTube and Android?

,----[ Quote ]
| Here's an interesting scenario: If Google 
| does stick to its guns and leaves China 
| because the country continues to insist on 
| censoring web search results and blocking 
| websites, will it also pull Android 
| cellphones from the Chinese market?
`----

http://www.pcworld.com/article/186907/google_android_youtube_china.html?tk=rss_news

Ballmer: Microsoft Will Stay in China

,----[ Quote ]
| Microsoft does not plan to follow Google's 
| lead in pulling out of China, the software 
| giant's CEO told news outlets on Thursday.
`----

http://www.pcworld.com/article/186964/ballmer_microsoft_will_stay_in_china.html?tk=rss_news


Recent:

More Sources Claim Chinese Government Involvement in Cyberattacks on Google, Others

,----[ Quote ]
| More sources are now claiming the Chinese
| government is behind the recent cyberattacks
| against Google and 33 other Silicon Valley
| companies, reports security firm Verisign
| iDefense. The attacks, revealed yesterday
| via a posting on Google's official blog,
| were hacking attempts on the technology
| infrastructure of Google and other major
| corporations in sectors that included
| finance, technology, media and chemical,
| said Dave Girouard, president of Google
| Enterprise.
|
| [...]
|
| While July's attacks were detected early and
| were largely uneventful, December's attacks
| did find some success. In addition, these
| same sources claim that the files in both
| cases share similar characteristics. For
| example, both attacks used a backdoor Trojan
| in the form of a Windows DLL, and both share
| two similar hosts for the command-and-
| control (C&C) communication. In layman's
| terms, if the cyberattack was a ground
| assault during a war, the C&C would be the
| general barking out the orders. Also in both
| incidents, the IP addresses used for C&C are
| in the same subnet and only six addresses
| apart from each other. That means both
| attacks are likely to have been instigated
| by the same entity and may imply that the
| recent victims' technology infrastructure
| has been compromised since July.
`----

http://www.readwriteweb.com/archives/sources_claim_chinese_government_involvement_in_attacks.php


A new approach to China

,----[ Quote ]
| Like many other well-known organizations, we
| face cyber attacks of varying degrees on a
| regular basis. In mid-December, we detected a
| highly sophisticated and targeted attack on
| our corporate infrastructure originating from
| China that resulted in the theft of
| intellectual property from Google. However,
| it soon became clear that what at first
| appeared to be solely a security incident--
| albeit a significant one--was something quite
| different.
|
| First, this attack was not just on Google. As
| part of our investigation we have discovered
| that at least twenty other large companies
| from a wide range of businesses--including
| the Internet, finance, technology, media and
| chemical sectors--have been similarly
| targeted. We are currently in the process of
| notifying those companies, and we are also
| working with the relevant U.S. authorities.
|
| Second, we have evidence to suggest that a
| primary goal of the attackers was accessing
| the Gmail accounts of Chinese human rights
| activists. Based on our investigation to date
| we believe their attack did not achieve that
| objective. Only two Gmail accounts appear to
| have been accessed, and that activity was
| limited to account information (such as the
| date the account was created) and subject
| line, rather than the content of emails
| themselves.
|
| [...]
|
| These attacks and the surveillance they have
| uncovered--combined with the attempts over
| the past year to further limit free speech on
| the web--have led us to conclude that we
| should review the feasibility of our business
| operations in China. We have decided we are
| no longer willing to continue censoring our
| results on Google.cn, and so over the next
| few weeks we will be discussing with the
| Chinese government the basis on which we
| could operate an unfiltered search engine
| within the law, if at all. We recognize that
| this may well mean having to shut down
| Google.cn, and potentially our offices in
| China.
`----

http://googleblog.blogspot.com/2010/01/new-approach-to-china.html


Related:

Bots rule in cyberspace

,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----

http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAktQhNoACgkQU4xAY3RXLo4p0gCfY1G+OD2pmrCBKsAJL3MC4p+Z
0RIAoLJSsmxwkR/fOVzT4Kw1n/HhpWaI
=vanl
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index